Endpoint Security Device Control is part of the Endpoint Management and Security Suite to enforce security policies for removable devices, media and data.
Ivanti Endpoint Security Device Control is an endpoint policy enforcement solution that stops security breaches before they can even start. All users are denied access by default. You simply authorise access to only the devices that the user needs. No one can plug into your network without approval. No one. Control is absolute. Endpoint Security Device Control also audits I/O device use as well as attempts to use unauthorised devices.
Hardware such as USB memory sticks, FireWire external hard-drives, scanners, music players (for example, mp3 players and iPods), digital cameras, PDAs, and CD and DVD burner drives are scattered throughout offices around the world. Their proliferation amplifies the threats posed by outsiders or users who plug in devices that could compromise the security of sensitive corporate data. Here, too, Endpoint Security Device Control does what you want it to do - it precludes the use of all devices that haven't been authorised and also allows if needed complete FireWire and USB port lockdown for maximum security, avoiding any data leakage or malware intrusion.
Access Control List (ACL) Based Permissions
Device White List
Scheduled and Temporary Device Access - Read and/or Write access
Uniquely Identify and Authorise Specific Removable Media
Plug and Play Devices: Hot Plug Support
Shadowing(tm) Option
Powerful Audit & Reporting Capabilities
Access Rights Updates
Flexible Administration
Disconnected/Remote Computer Protected
Restrict the Amount of Data Copied
Scalability
Microsoft Active Directory and Novell eDirectory Support
Silent Unattended Installations & Deployment
Prevention from PS/2 hardware keyloggers
Online and Offline permissions/updates
Easy Exchange encryption mode
FireWire, Bluetooth and USB port protection / control
Opinion & Resources
CST works in partnership with Ivanti to provide a comprehensive Endpoint Management and Security Suite which assists with the main criteria for becoming Cyber Essentials accredited.
The Cyber Essentials scheme has been developed by the Government to provide organisations with basic protection from the most prevalent forms of threats coming from the Internet.
By implementing the measures from this scheme, organisations can significantly reduce their risk of vulnerabilities whilst demonstrating this to customers, investors, insurers and others that they have taken these essential precautions.
Contact us learn more about Cyber Essentials accrediation.
Nigel Lewis